{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T05:48:25.385","vulnerabilities":[{"cve":{"id":"CVE-2022-38873","sourceIdentifier":"cve@mitre.org","published":"2022-12-20T20:15:09.730","lastModified":"2025-04-17T14:15:20.023","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"D-Link devices DAP-2310 v2.10rc036 and earlier, DAP-2330 v1.06rc020 and earlier, DAP-2360 v2.10rc050 and earlier, DAP-2553 v3.10rc031 and earlier, DAP-2660 v1.15rc093 and earlier, DAP-2690 v3.20rc106 and earlier, DAP-2695 v1.20rc119_beta31 and earlier, DAP-3320 v1.05rc027 beta and earlier, DAP-3662 v1.05rc047 and earlier allows attackers to cause a Denial of Service (DoS) via uploading a crafted firmware after modifying the firmware header."},{"lang":"es","value":"Dispositivos D-Link DAP-2310 v2.10rc036 y anteriores, DAP-2330 v1.06rc020 y anteriores, DAP-2360 v2.10rc050 y anteriores, DAP-2553 v3.10rc031 y anteriores, DAP-2660 v1.15rc093 y anteriores, DAP -2690 v3.20rc106 y anteriores, DAP-2695 v1.20rc119_beta31 y anteriores, DAP-3320 v1.05rc027 beta y anteriores, DAP-3662 v1.05rc047 y anteriores permiten a los atacantes provocar una Denegación de Servicio (DoS) mediante la carga de un archivo  firmware manipulado después de modificar el encabezado del firmware."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-345"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-2310_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.10rc036","matchCriteriaId":"6E01CB3D-1FAC-4C33-9264-2F2FAD52C074"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dap-2310:-:*:*:*:*:*:*:*","matchCriteriaId":"8C5F3D97-3CFE-41B9-9C8B-832445EA92B0"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-2330_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.06rc020","matchCriteriaId":"D27777C9-9EBB-445D-A32E-C653B7A7F3C3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dap-2330:-:*:*:*:*:*:*:*","matchCriteriaId":"9ABC8839-D62A-4AAB-A9D2-AFE95CBB9B17"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-2360_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.10rc050","matchCriteriaId":"72990409-D459-4377-AF92-DE6CFF37538B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dap-2360:-:*:*:*:*:*:*:*","matchCriteriaId":"E7AE9A88-AD97-41A5-9847-4282788EBB1E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-2553_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"3.10rc031","matchCriteriaId":"765FA98C-CAA6-4670-91F3-F8354C4BC9AA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dap-2553:-:*:*:*:*:*:*:*","matchCriteriaId":"20BA9382-B0D4-4E7C-A198-067AA65AB190"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-2660_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.15rc093","matchCriteriaId":"4A2D6EAC-AF66-476A-83BB-8E4DBDAD209A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dap-2660:-:*:*:*:*:*:*:*","matchCriteriaId":"41EFE653-296E-4E37-9DCC-BAF99C4AD2F3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-2690_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"3.20rc106","matchCriteriaId":"DD9D1F13-DA3D-4DD6-9129-96A2D13B63CE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dap-2690:-:*:*:*:*:*:*:*","matchCriteriaId":"3B827A81-49A8-4AFD-943A-3F359615E49D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-2695_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.20rc119","matchCriteriaId":"DE7919F6-589A-4899-9409-D0EEA9AA9541"},{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-2695_firmware:1.20rc119:beta31:*:*:*:*:*:*","matchCriteriaId":"51114170-3DAD-4AD8-8307-46679FE8866F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dap-2695:-:*:*:*:*:*:*:*","matchCriteriaId":"9039DA66-D624-4590-B236-101B775C5956"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-3320_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.05rc027","matchCriteriaId":"7D790C29-76BD-42E9-A60D-8E734AF60E8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-3320_firmware:1.05rc027:beta:*:*:*:*:*:*","matchCriteriaId":"CDD601D1-0B67-4884-8A03-F7766568685E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dap-3320:-:*:*:*:*:*:*:*","matchCriteriaId":"95D03B33-E8D6-4ED3-AED3-8FBDE80C74CB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:dlink:dap-3662_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.05rc047","matchCriteriaId":"997A03CA-7140-470D-8F20-05360B44EAA5"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:dlink:dap-3662:-:*:*:*:*:*:*:*","matchCriteriaId":"07645866-3B61-46AB-85C6-ED86F1B0D47F"}]}]}],"references":[{"url":"https://github.com/Yuhao-W/BUG--D-Link--Firmware-Update-Vulnerabilities/blob/main/README.md","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.dlink.com/en/security-bulletin/","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://github.com/Yuhao-W/BUG--D-Link--Firmware-Update-Vulnerabilities/blob/main/README.md","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.dlink.com/en/security-bulletin/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}